Analysis

  • max time kernel
    155s
  • max time network
    131s
  • platform
    windows10_x64
  • resource
    win10-en-20210920
  • submitted
    08-10-2021 06:13

General

  • Target

    39a2a53312497f41dfe04b75e19a5e58.exe

  • Size

    241KB

  • MD5

    39a2a53312497f41dfe04b75e19a5e58

  • SHA1

    80d44d1b07ff289d510b175707b5ebfaddc82ca3

  • SHA256

    da34d81f2d973efd60e29141088b139868c210d26f2ca4715e5e27152443890e

  • SHA512

    4dbeaa39eec98da7c4cfdd62b39308391608641820da5f3908b14deaec76d889c6ca1a90af0a6f98a7f3dc115b0435d2601e0a79437ec2dc23544311ca646476

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://fiskahlilian16.top/

http://paishancho17.top/

http://ydiannetter18.top/

http://azarehanelle19.top/

http://quericeriant20.top/

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

helo

C2

144.202.13.247:46573

Extracted

Family

raccoon

Version

1.8.2

Botnet

8d179b9e611eee525425544ee8c6d77360ab7cd9

Attributes
  • url4cnc

    http://teletop.top/agrybirdsgamerept

    http://teleta.top/agrybirdsgamerept

    https://t.me/agrybirdsgamerept

rc4.plain
rc4.plain

Signatures

  • Raccoon

    Simple but powerful infostealer which was very active in 2019.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 5 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • suricata: ET MALWARE Win32.Raccoon Stealer CnC Activity (dependency download)

    suricata: ET MALWARE Win32.Raccoon Stealer CnC Activity (dependency download)

  • suricata: ET MALWARE Win32.Raccoon Stealer Data Exfil Attempt

    suricata: ET MALWARE Win32.Raccoon Stealer Data Exfil Attempt

  • Core1 .NET packer 2 IoCs

    Detects packer/loader used by .NET malware.

  • Vidar Stealer 2 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 3 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 5 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 8 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 49 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\39a2a53312497f41dfe04b75e19a5e58.exe
    "C:\Users\Admin\AppData\Local\Temp\39a2a53312497f41dfe04b75e19a5e58.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:376
    • C:\Users\Admin\AppData\Local\Temp\39a2a53312497f41dfe04b75e19a5e58.exe
      "C:\Users\Admin\AppData\Local\Temp\39a2a53312497f41dfe04b75e19a5e58.exe"
      2⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:4352
  • C:\Users\Admin\AppData\Local\Temp\16FF.exe
    C:\Users\Admin\AppData\Local\Temp\16FF.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Accesses Microsoft Outlook accounts
    • Accesses Microsoft Outlook profiles
    • Suspicious use of WriteProcessMemory
    • outlook_office_path
    • outlook_win_path
    PID:4568
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\16FF.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2656
      • C:\Windows\SysWOW64\timeout.exe
        timeout /T 10 /NOBREAK
        3⤵
        • Delays execution with timeout.exe
        PID:1476
  • C:\Users\Admin\AppData\Local\Temp\1D97.exe
    C:\Users\Admin\AppData\Local\Temp\1D97.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4540
    • C:\Windows\SysWOW64\explorer.exe
      "C:\Windows\SysWOW64\explorer.exe"
      2⤵
        PID:4660
      • C:\Windows\SysWOW64\explorer.exe
        "C:\Windows\SysWOW64\explorer.exe"
        2⤵
          PID:4596
        • C:\Windows\SysWOW64\explorer.exe
          "C:\Windows\SysWOW64\explorer.exe"
          2⤵
            PID:4308
          • C:\Windows\SysWOW64\explorer.exe
            "C:\Windows\SysWOW64\explorer.exe"
            2⤵
              PID:4332
            • C:\Windows\SysWOW64\explorer.exe
              "C:\Windows\SysWOW64\explorer.exe"
              2⤵
                PID:4328
              • C:\Windows\SysWOW64\explorer.exe
                "C:\Windows\SysWOW64\explorer.exe"
                2⤵
                  PID:596
                • C:\Windows\SysWOW64\explorer.exe
                  "C:\Windows\SysWOW64\explorer.exe"
                  2⤵
                    PID:648
                  • C:\Windows\SysWOW64\explorer.exe
                    "C:\Windows\SysWOW64\explorer.exe"
                    2⤵
                      PID:816
                    • C:\Windows\SysWOW64\explorer.exe
                      "C:\Windows\SysWOW64\explorer.exe"
                      2⤵
                        PID:820
                      • C:\Windows\SysWOW64\explorer.exe
                        "C:\Windows\SysWOW64\explorer.exe"
                        2⤵
                          PID:752
                      • C:\Users\Admin\AppData\Local\Temp\20E4.exe
                        C:\Users\Admin\AppData\Local\Temp\20E4.exe
                        1⤵
                        • Executes dropped EXE
                        PID:756

                      Network

                      MITRE ATT&CK Matrix ATT&CK v6

                      Credential Access

                      Credentials in Files

                      3
                      T1081

                      Discovery

                      Query Registry

                      2
                      T1012

                      Peripheral Device Discovery

                      1
                      T1120

                      System Information Discovery

                      1
                      T1082

                      Collection

                      Data from Local System

                      3
                      T1005

                      Email Collection

                      2
                      T1114

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Temp\16FF.exe
                        MD5

                        ed526d586092d16c1f7bc46b11157d51

                        SHA1

                        fa29dab73cc3089c2367bc6498abd11cf0498b25

                        SHA256

                        d02be62f142cc5475715feaaa75c1a2e7cbd9d17918290c2b38f828fa00e161d

                        SHA512

                        9b7438646ba16208f29d9c9b9cd4405c6729fb92e21b8caac35a294201830c4ee6f3821d891e0159ea612e61d7c723ffdb5588945b10f12b52cfc6aac6b13850

                      • C:\Users\Admin\AppData\Local\Temp\16FF.exe
                        MD5

                        ed526d586092d16c1f7bc46b11157d51

                        SHA1

                        fa29dab73cc3089c2367bc6498abd11cf0498b25

                        SHA256

                        d02be62f142cc5475715feaaa75c1a2e7cbd9d17918290c2b38f828fa00e161d

                        SHA512

                        9b7438646ba16208f29d9c9b9cd4405c6729fb92e21b8caac35a294201830c4ee6f3821d891e0159ea612e61d7c723ffdb5588945b10f12b52cfc6aac6b13850

                      • C:\Users\Admin\AppData\Local\Temp\1D97.exe
                        MD5

                        e03cf8b5db7580f2ac89868800d9481c

                        SHA1

                        7c97261b5ea86b5b84881ed4cc2394062742c14e

                        SHA256

                        92e463a3267d079981cbcce21f01b7a6e911d667e89c2fa98270247579499b66

                        SHA512

                        9dfac446d570bf4f74abd1da9e1a92dae6b6d37793097464b14fb19384a19bd3e75043d74c5c2b404d667d6e5f2fac0267a5d343fb5af53546c5498c5171f239

                      • C:\Users\Admin\AppData\Local\Temp\1D97.exe
                        MD5

                        e03cf8b5db7580f2ac89868800d9481c

                        SHA1

                        7c97261b5ea86b5b84881ed4cc2394062742c14e

                        SHA256

                        92e463a3267d079981cbcce21f01b7a6e911d667e89c2fa98270247579499b66

                        SHA512

                        9dfac446d570bf4f74abd1da9e1a92dae6b6d37793097464b14fb19384a19bd3e75043d74c5c2b404d667d6e5f2fac0267a5d343fb5af53546c5498c5171f239

                      • C:\Users\Admin\AppData\Local\Temp\20E4.exe
                        MD5

                        56083cc74dbec5c8a8e742f1d68240f2

                        SHA1

                        48d48886e6ecb985c057ddbb17d8d28f4ed44f44

                        SHA256

                        20c6072cb0227a2c6addc88f14b170ff3d182034b92b34a6c8f471def5463bbc

                        SHA512

                        805a58a73ea594ee7529f4526afa2a86855a268372477b2d624f98e3c6e1fc3a00643bfc868b2c1f5e66364cbf7113506699f45fdf09e91289b1c212b5c1215a

                      • C:\Users\Admin\AppData\Local\Temp\20E4.exe
                        MD5

                        56083cc74dbec5c8a8e742f1d68240f2

                        SHA1

                        48d48886e6ecb985c057ddbb17d8d28f4ed44f44

                        SHA256

                        20c6072cb0227a2c6addc88f14b170ff3d182034b92b34a6c8f471def5463bbc

                        SHA512

                        805a58a73ea594ee7529f4526afa2a86855a268372477b2d624f98e3c6e1fc3a00643bfc868b2c1f5e66364cbf7113506699f45fdf09e91289b1c212b5c1215a

                      • \Users\Admin\AppData\LocalLow\FflibsFder.tmp\freebl3.dll
                        MD5

                        60acd24430204ad2dc7f148b8cfe9bdc

                        SHA1

                        989f377b9117d7cb21cbe92a4117f88f9c7693d9

                        SHA256

                        9876c53134dbbec4dcca67581f53638eba3fea3a15491aa3cf2526b71032da97

                        SHA512

                        626c36e9567f57fa8ec9c36d96cbadede9c6f6734a7305ecfb9f798952bbacdfa33a1b6c4999ba5b78897dc2ec6f91870f7ec25b2ceacbaee4be942fe881db01

                      • \Users\Admin\AppData\LocalLow\FflibsFder.tmp\mozglue.dll
                        MD5

                        eae9273f8cdcf9321c6c37c244773139

                        SHA1

                        8378e2a2f3635574c106eea8419b5eb00b8489b0

                        SHA256

                        a0c6630d4012ae0311ff40f4f06911bcf1a23f7a4762ce219b8dffa012d188cc

                        SHA512

                        06e43e484a89cea9ba9b9519828d38e7c64b040f44cdaeb321cbda574e7551b11fea139ce3538f387a0a39a3d8c4cba7f4cf03e4a3c98db85f8121c2212a9097

                      • \Users\Admin\AppData\LocalLow\FflibsFder.tmp\nss3.dll
                        MD5

                        02cc7b8ee30056d5912de54f1bdfc219

                        SHA1

                        a6923da95705fb81e368ae48f93d28522ef552fb

                        SHA256

                        1989526553fd1e1e49b0fea8036822ca062d3d39c4cab4a37846173d0f1753d5

                        SHA512

                        0d5dfcf4fb19b27246fa799e339d67cd1b494427783f379267fb2d10d615ffb734711bab2c515062c078f990a44a36f2d15859b1dacd4143dcc35b5c0cee0ef5

                      • \Users\Admin\AppData\LocalLow\FflibsFder.tmp\softokn3.dll
                        MD5

                        4e8df049f3459fa94ab6ad387f3561ac

                        SHA1

                        06ed392bc29ad9d5fc05ee254c2625fd65925114

                        SHA256

                        25a4dae37120426ab060ebb39b7030b3e7c1093cc34b0877f223b6843b651871

                        SHA512

                        3dd4a86f83465989b2b30c240a7307edd1b92d5c1d5c57d47eff287dc9daa7bace157017908d82e00be90f08ff5badb68019ffc9d881440229dcea5038f61cd6

                      • \Users\Admin\AppData\LocalLow\sqlite3.dll
                        MD5

                        f964811b68f9f1487c2b41e1aef576ce

                        SHA1

                        b423959793f14b1416bc3b7051bed58a1034025f

                        SHA256

                        83bc57dcf282264f2b00c21ce0339eac20fcb7401f7c5472c0cd0c014844e5f7

                        SHA512

                        565b1a7291c6fcb63205907fcd9e72fc2e11ca945afc4468c378edba882e2f314c2ac21a7263880ff7d4b84c2a1678024c1ac9971ac1c1de2bfa4248ec0f98c4

                      • memory/376-118-0x0000000000030000-0x0000000000039000-memory.dmp
                        Filesize

                        36KB

                      • memory/756-139-0x0000000004940000-0x0000000004941000-memory.dmp
                        Filesize

                        4KB

                      • memory/756-144-0x0000000004ED0000-0x0000000004ED1000-memory.dmp
                        Filesize

                        4KB

                      • memory/756-130-0x0000000000000000-mapping.dmp
                      • memory/756-152-0x0000000004934000-0x0000000004936000-memory.dmp
                        Filesize

                        8KB

                      • memory/756-151-0x0000000004933000-0x0000000004934000-memory.dmp
                        Filesize

                        4KB

                      • memory/756-150-0x0000000004932000-0x0000000004933000-memory.dmp
                        Filesize

                        4KB

                      • memory/756-138-0x00000000048E0000-0x0000000004923000-memory.dmp
                        Filesize

                        268KB

                      • memory/756-149-0x0000000004930000-0x0000000004931000-memory.dmp
                        Filesize

                        4KB

                      • memory/756-142-0x0000000004E80000-0x0000000004EC2000-memory.dmp
                        Filesize

                        264KB

                      • memory/1476-161-0x0000000000000000-mapping.dmp
                      • memory/2552-119-0x0000000000ED0000-0x0000000000EE5000-memory.dmp
                        Filesize

                        84KB

                      • memory/2656-160-0x0000000000000000-mapping.dmp
                      • memory/4352-117-0x0000000000402F18-mapping.dmp
                      • memory/4352-116-0x0000000000400000-0x0000000000409000-memory.dmp
                        Filesize

                        36KB

                      • memory/4540-162-0x000000001F6A0000-0x000000001F6A1000-memory.dmp
                        Filesize

                        4KB

                      • memory/4540-167-0x0000000001B12000-0x0000000001B14000-memory.dmp
                        Filesize

                        8KB

                      • memory/4540-124-0x0000000000000000-mapping.dmp
                      • memory/4540-148-0x00000000034B0000-0x00000000034B1000-memory.dmp
                        Filesize

                        4KB

                      • memory/4540-140-0x0000000001580000-0x000000000159D000-memory.dmp
                        Filesize

                        116KB

                      • memory/4540-137-0x0000000001B10000-0x0000000001B12000-memory.dmp
                        Filesize

                        8KB

                      • memory/4540-136-0x0000000003340000-0x0000000003415000-memory.dmp
                        Filesize

                        852KB

                      • memory/4540-135-0x0000000001570000-0x0000000001571000-memory.dmp
                        Filesize

                        4KB

                      • memory/4540-166-0x000000001C970000-0x000000001C971000-memory.dmp
                        Filesize

                        4KB

                      • memory/4540-165-0x0000000003480000-0x0000000003481000-memory.dmp
                        Filesize

                        4KB

                      • memory/4540-145-0x0000000022B40000-0x0000000022B41000-memory.dmp
                        Filesize

                        4KB

                      • memory/4540-147-0x0000000001B70000-0x0000000001B71000-memory.dmp
                        Filesize

                        4KB

                      • memory/4540-164-0x000000001F550000-0x000000001F551000-memory.dmp
                        Filesize

                        4KB

                      • memory/4540-134-0x0000000001560000-0x0000000001570000-memory.dmp
                        Filesize

                        64KB

                      • memory/4540-133-0x000000001D640000-0x000000001D74D000-memory.dmp
                        Filesize

                        1.1MB

                      • memory/4540-127-0x0000000000C30000-0x0000000000C31000-memory.dmp
                        Filesize

                        4KB

                      • memory/4540-129-0x000000001CCD0000-0x000000001CE37000-memory.dmp
                        Filesize

                        1.4MB

                      • memory/4540-146-0x0000000001B00000-0x0000000001B08000-memory.dmp
                        Filesize

                        32KB

                      • memory/4540-163-0x0000000025180000-0x0000000025181000-memory.dmp
                        Filesize

                        4KB

                      • memory/4568-153-0x0000000002BC0000-0x0000000002C6E000-memory.dmp
                        Filesize

                        696KB

                      • memory/4568-120-0x0000000000000000-mapping.dmp
                      • memory/4568-154-0x0000000000400000-0x0000000002BB6000-memory.dmp
                        Filesize

                        39.7MB

                      • memory/4568-123-0x0000000002E71000-0x0000000002EC0000-memory.dmp
                        Filesize

                        316KB